{"id":"https://openalex.org/W3134629296","doi":"https://doi.org/10.1109/wifs49906.2020.9360884","title":"Synchronization Minimizing Statistical Detectability for Side-Informed JPEG Steganography","display_name":"Synchronization Minimizing Statistical Detectability for Side-Informed JPEG Steganography","publication_year":2020,"publication_date":"2020-12-06","ids":{"openalex":"https://openalex.org/W3134629296","doi":"https://doi.org/10.1109/wifs49906.2020.9360884","mag":"3134629296"},"language":"en","primary_location":{"id":"doi:10.1109/wifs49906.2020.9360884","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wifs49906.2020.9360884","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE International Workshop on Information Forensics and Security (WIFS)","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://hal.science/hal-03006635","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5069557809","display_name":"Eva Giboulot","orcid":"https://orcid.org/0000-0002-0277-5999"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Eva Giboulot","raw_affiliation_strings":["Troyes University of Technology,LM2S Lab,ROSAS dept"],"affiliations":[{"raw_affiliation_string":"Troyes University of Technology,LM2S Lab,ROSAS dept","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012748071","display_name":"Patrick Bas","orcid":"https://orcid.org/0000-0003-0873-5872"},"institutions":[{"id":"https://openalex.org/I4210115519","display_name":"Centre de Recherche en Informatique","ror":"https://ror.org/020cdve92","country_code":"FR","type":"facility","lineage":["https://openalex.org/I190752583","https://openalex.org/I2746051580","https://openalex.org/I4210091621","https://openalex.org/I4210115519","https://openalex.org/I70768539"]},{"id":"https://openalex.org/I7454413","display_name":"\u00c9cole Centrale de Lille","ror":"https://ror.org/01x441g73","country_code":"FR","type":"education","lineage":["https://openalex.org/I7454413"]},{"id":"https://openalex.org/I4387153239","display_name":"Centre de Recherche en Informatique, Signal et Automatique de Lille","ror":"https://ror.org/05vrs3189","country_code":null,"type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I2279609970","https://openalex.org/I4387153239","https://openalex.org/I7454413"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Patrick Bas","raw_affiliation_strings":["CNRS and &#x00C9;cole Centrale de Lille,CRIStAL Lab","Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189"],"affiliations":[{"raw_affiliation_string":"CNRS and &#x00C9;cole Centrale de Lille,CRIStAL Lab","institution_ids":["https://openalex.org/I7454413"]},{"raw_affiliation_string":"Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189","institution_ids":["https://openalex.org/I4210115519","https://openalex.org/I4387153239"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5030924469","display_name":"R\u00e9mi Cogranne","orcid":"https://orcid.org/0000-0002-4205-4694"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"R\u00e9mi Cogranne","raw_affiliation_strings":["Troyes University of Technology,LM2S Lab,ROSAS dept"],"affiliations":[{"raw_affiliation_string":"Troyes University of Technology,LM2S Lab,ROSAS dept","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5069557809"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.41986927,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.63701689,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.7436173558235168},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7142751216888428},{"id":"https://openalex.org/keywords/jpeg","display_name":"JPEG","score":0.7121328115463257},{"id":"https://openalex.org/keywords/distortion-function","display_name":"Distortion function","score":0.5673325061798096},{"id":"https://openalex.org/keywords/discrete-cosine-transform","display_name":"Discrete cosine transform","score":0.5660278797149658},{"id":"https://openalex.org/keywords/synchronization","display_name":"Synchronization (alternating current)","score":0.5569759607315063},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5170077085494995},{"id":"https://openalex.org/keywords/covariance","display_name":"Covariance","score":0.5152214169502258},{"id":"https://openalex.org/keywords/heuristic","display_name":"Heuristic","score":0.493222177028656},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.4381949007511139},{"id":"https://openalex.org/keywords/noise","display_name":"Noise (video)","score":0.415372371673584},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.41184481978416443},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.4103074073791504},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3216191530227661},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.24280092120170593},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.20159348845481873},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.19822371006011963},{"id":"https://openalex.org/keywords/data-compression","display_name":"Data compression","score":0.15241828560829163},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.14042380452156067},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.10754469037055969},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.08766326308250427}],"concepts":[{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.7436173558235168},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7142751216888428},{"id":"https://openalex.org/C198751489","wikidata":"https://www.wikidata.org/wiki/Q2195","display_name":"JPEG","level":3,"score":0.7121328115463257},{"id":"https://openalex.org/C2780803321","wikidata":"https://www.wikidata.org/wiki/Q5283073","display_name":"Distortion function","level":3,"score":0.5673325061798096},{"id":"https://openalex.org/C2221639","wikidata":"https://www.wikidata.org/wiki/Q2877","display_name":"Discrete cosine transform","level":3,"score":0.5660278797149658},{"id":"https://openalex.org/C2778562939","wikidata":"https://www.wikidata.org/wiki/Q1298791","display_name":"Synchronization (alternating current)","level":3,"score":0.5569759607315063},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5170077085494995},{"id":"https://openalex.org/C178650346","wikidata":"https://www.wikidata.org/wiki/Q201984","display_name":"Covariance","level":2,"score":0.5152214169502258},{"id":"https://openalex.org/C173801870","wikidata":"https://www.wikidata.org/wiki/Q201413","display_name":"Heuristic","level":2,"score":0.493222177028656},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.4381949007511139},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.415372371673584},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.41184481978416443},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.4103074073791504},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3216191530227661},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.24280092120170593},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.20159348845481873},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.19822371006011963},{"id":"https://openalex.org/C78548338","wikidata":"https://www.wikidata.org/wiki/Q2493","display_name":"Data compression","level":2,"score":0.15241828560829163},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.14042380452156067},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.10754469037055969},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.08766326308250427},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/wifs49906.2020.9360884","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wifs49906.2020.9360884","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE International Workshop on Information Forensics and Security (WIFS)","raw_type":"proceedings-article"},{"id":"pmh:oai:HAL:hal-03006635v1","is_oa":true,"landing_page_url":"https://hal.science/hal-03006635","pdf_url":null,"source":null,"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE International Workshop on Information Forensics and Security, Dec 2020, New York, United States. &#x27E8;10.1109/WIFS49906.2020.9360884&#x27E9;","raw_type":"Conference papers"},{"id":"pmh:oai:lilloa.univ-lille.fr:20.500.12210/57548","is_oa":true,"landing_page_url":"http://hdl.handle.net/20.500.12210/57548","pdf_url":null,"source":{"id":"https://openalex.org/S4306402203","display_name":"LillOA (Universit\u00e9 de Lille (University Of Lille))","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210123514","host_organization_name":"Centre d'Etudes en Civilisations, Langues et Litt\u00e9ratures Etrang\u00e8res","host_organization_lineage":["https://openalex.org/I4210123514"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/conferenceObject"}],"best_oa_location":{"id":"pmh:oai:HAL:hal-03006635v1","is_oa":true,"landing_page_url":"https://hal.science/hal-03006635","pdf_url":null,"source":null,"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE International Workshop on Information Forensics and Security, Dec 2020, New York, United States. &#x27E8;10.1109/WIFS49906.2020.9360884&#x27E9;","raw_type":"Conference papers"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W22271197","https://openalex.org/W1536252645","https://openalex.org/W1604614341","https://openalex.org/W2015721798","https://openalex.org/W2022503816","https://openalex.org/W2036237598","https://openalex.org/W2040953223","https://openalex.org/W2096156898","https://openalex.org/W2104705565","https://openalex.org/W2134527668","https://openalex.org/W2136035751","https://openalex.org/W2154026545","https://openalex.org/W2170598445","https://openalex.org/W2192227561","https://openalex.org/W2545848843","https://openalex.org/W2784453069","https://openalex.org/W2883006208","https://openalex.org/W2937851289","https://openalex.org/W2960042904","https://openalex.org/W2972741388","https://openalex.org/W3015273631","https://openalex.org/W3037490193","https://openalex.org/W3042716719"],"related_works":["https://openalex.org/W1597187555","https://openalex.org/W2241212938","https://openalex.org/W2614249221","https://openalex.org/W1529294424","https://openalex.org/W2160587766","https://openalex.org/W2357125417","https://openalex.org/W2997133669","https://openalex.org/W2108294500","https://openalex.org/W2914041582","https://openalex.org/W3045883714"],"abstract_inverted_index":{"Current":[0],"schemes":[1],"in":[2,50,65,136],"steganography":[3],"relying":[4],"on":[5,10,70,122],"synchronization":[6,126],"are":[7],"all":[8],"based":[9,69],"a":[11,29,61,83,103,114],"general":[12],"heuristic":[13],"to":[14],"take":[15],"into":[16,88],"account":[17,89],"interactions":[18],"between":[19,35,91],"embedding":[20],"changes.":[21],"However":[22],"these":[23],"approaches,":[24],"while":[25],"often":[26],"competitive,":[27],"lack":[28],"clear":[30,115],"model":[31,85],"for":[32],"the":[33,39,66,107,118,123],"relationship":[34],"pixels/DCT":[36],"coefficient":[37],"and":[38,94,130],"distortion":[40],"function,":[41],"and,":[42],"as":[43],"such,":[44],"do":[45],"not":[46],"give":[47],"any":[48],"guarantees":[49],"terms":[51],"of":[52,106,117],"detectabilty.":[53],"To":[54],"solve":[55],"this":[56],"problem,":[57],"we":[58],"herein":[59],"propose":[60],"synchronized":[62],"side-informed":[63],"scheme":[64],"JPEG":[67],"domain":[68],"minimizing":[71],"statistical":[72,84],"detectability":[73],"which":[74,101],"achieves":[75],"state-of-the-art":[76],"performances.":[77],"This":[78,111],"is":[79,102],"done":[80],"by":[81],"exploiting":[82],"that":[86],"takes":[87],"correlations":[90],"DCT":[92],"coefficients":[93],"adding":[95],"an":[96],"optimal":[97],"steganographic-signal":[98],"with":[99],"covariance":[100],"scaled":[104],"version":[105],"cover":[108],"noise":[109],"covariance.":[110],"method":[112],"allows":[113,133],"understanding":[116],"reasons":[119],"why,":[120],"depending":[121],"processing":[124],"pipeline,":[125],"using":[127],"both":[128],"intra":[129],"inter-block":[131],"dependencies":[132],"such":[134],"gains":[135],"performance.":[137]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2021,"cited_by_count":2}],"updated_date":"2026-02-09T09:26:11.010843","created_date":"2021-03-15T00:00:00"}
